000 04623nam a22005175i 4500
001 978-3-319-04918-2
003 DE-He213
005 20200421111658.0
007 cr nn 008mamaa
008 140228s2014 gw | s |||| 0|eng d
020 _a9783319049182
_9978-3-319-04918-2
024 7 _a10.1007/978-3-319-04918-2
_2doi
050 4 _aQA76.9.E94
072 7 _aUYD
_2bicssc
072 7 _aCOM074000
_2bisacsh
082 0 4 _a004.24
_223
245 1 0 _aPassive and Active Measurement
_h[electronic resource] :
_b15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings /
_cedited by Michalis Faloutsos, Aleksandar Kuzmanovic.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2014.
300 _aXII, 282 p. 118 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8362
505 0 _aRadio Prophet: Intelligent Radio Resource Deallocation for Cellular Networks -- Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis -- Diagnosing Path Inflation of Mobile Client Traffic -- An End-to-End Measurement Study of Modern Cellular Data Networks -- A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option -- Ingress Point Spreading: A New Primitive for Adaptive Active Network Mapping -- On Searching for Patterns in Traceroute Responses -- Volume-Based Transit Pricing: Is 95 the Right Percentile? -- Dissecting Round Trip Time on the Slow Path with a Single Packet -- Is Our Ground-Truth for Traffic Classification Reliable? -- Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels -- The Need for End-to-End Evaluation of Cloud Availability -- Exposing Inconsistent Web Search Results with Bobble -- Modern Application Layer Transmission Patterns from a Transport Perspective -- Third-Party Identity Management Usage on the Web -- Understanding the Reachability of IPv6 Limited Visibility Prefixes -- Violation of Inter domain Routing Assumptions -- Here Be Web Proxies -- Towards an Automated Investigation of the Impact of BGP Routing Changes on Network Delay Variations -- Peering at the Internet's Frontier: A First Look at ISP Interconnectivity in Africa -- Assessing DNS Vulnerability to Record Injection -- How Vulnerable Are Unprotected Machines on the Internet? -- A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information? -- On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records -- Scaling Bandwidth Estimation to High Speed Networks -- Scalable Accurate Consolidation of Passively Measured Statistical Data -- A Needle in the Haystack - Delay Based User Identification in Cellular Networks -- Understanding HTTP Traffic and CDN Behavior from the Eyes of a Mobile ISP -- On Understanding User Interests through Heterogeneous Data Sources -- Nightlights: Entropy-Based Metrics for Classifying Dark space Traffic Patterns -- Distributed Active Measurement of Internet Queuing Delays.
520 _aThis book constitutes the refereed proceedings of the 15th International Conference on Passive and Active Measurement, PAM 2014, held in Los Angeles, CA, USA, in 2014. The 24 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers have been organized in the following topical sections: internet wireless and mobility; measurement design, experience and analysis; performance measurement; protocol and application behavior; characterization of network behavior; and network security and privacy. In addition 7 poster papers have been included.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer system failures.
650 0 _aComputer security.
650 1 4 _aComputer Science.
650 2 4 _aSystem Performance and Evaluation.
650 2 4 _aComputer Communication Networks.
650 2 4 _aSystems and Data Security.
700 1 _aFaloutsos, Michalis.
_eeditor.
700 1 _aKuzmanovic, Aleksandar.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319049175
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8362
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-04918-2
912 _aZDB-2-SCS
912 _aZDB-2-LNC
942 _cEBK
999 _c54854
_d54854